{"id":191,"date":"2025-01-14T17:15:52","date_gmt":"2025-01-14T17:15:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mdellolio\/?page_id=191"},"modified":"2025-04-15T02:07:05","modified_gmt":"2025-04-15T02:07:05","slug":"cyse201","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mdellolio\/cyse201\/","title":{"rendered":"CYSE201"},"content":{"rendered":"\n<p class=\"has-white-color has-text-color has-background has-link-color wp-elements-41cd9933ea8ad5b24dd4513fce43cade\" style=\"background:linear-gradient(4deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);font-size:31px;font-style:normal;font-weight:600\">CYBERSECURITY &amp; SOCIAL SCIENCE<\/p>\n\n\n\n<p>Cybersecurity, often viewed as a technical field, is deeply multidisciplinary and benefits significantly from a social science perspective. This course explores cybersecurity&#8217;s social, political, legal, criminological, and economic dimensions, emphasizing a human-factors approach to understanding threats. It examines the societal drivers of cyber incidents and the regulatory frameworks addressing risky behaviors. Additionally, the course highlights how various social science disciplines, including psychology, criminology, sociology, and international studies, contribute to the study of cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Classwork Journal <\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1NAeq-K39c97wcpnBS9rSiWyM2uRllwCAigAAbRD38L8\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 1 <\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1eyBbCrtPb0nqvdCXE48iu-fxHz4KcaK021cqgqvKH84\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 2<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/119Sn66ta-BW7GLAtlxx3ywoROmEMbnc5s9DRTxpQZXk\/edit?tab=t.0\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 3<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1JfiGVvakS13K9vRe22VWNIfYOhD_3K-znmKnTLz3SSs\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 4<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1eb3K01V5S-nHeliZqRRG6FC32zujxRtzvGYC1tvbWWI\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 5<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1fI6VEh1s8QgkqVMus7mrWKrMG-eNL54EjMp4KZzXkfw\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 6<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1TV75_8gx5SJwnPm-tAzRfhWv4LM_DPLAV6PFIrnW8aQ\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\">Entry 7<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/19NalX4cYTGw3mYFe-jWf0AiBMHQxwJ-sJI7lp7SzUZM\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 8<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1mJ-HpvVKAR2SGXjcrQ8lbjtGsSITDJxfefwb9yXJ5-4\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 9<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1aH9dVRZQxQGeNdyKvlwzt5kPYHJ3H9i-3Vb0vg2aMY4\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 10<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1Bl9tEICEVhoUzbxj2fXZjEmbqdESkgch9GNaFdtE-Dw\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 11<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/16kqMnq01zejUcf8ztEFz9ObyJCnkVEu0RQf_2su55M4\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 12<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1KMwcDT0xAqXJQ6no9Sx8YEDB6mR04NQFBGkp4AZvbxQ\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 13<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/docs.google.com\/document\/d\/1FOd_iXc8lsgYNBMybX_9w2b1GaWvBt0-m2dqaPirMxw\/edit?usp=sharing\" style=\"background:linear-gradient(6deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%)\" target=\"_blank\" rel=\"noreferrer noopener\">Entry 14<\/a><\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #1<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/CYSE201-Article-Review-1-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE201-Article-Review-1-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Article Review #2<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/03\/CYSE201-Article-Review-2-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE201-Article-Review-2-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity has-midnight-gradient-background has-background is-style-default\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Career Paper<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/04\/CYSE201-Career-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE201-Career-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"575\" src=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/Designing-Social-Engineering-Security-Policies-2.jpg\" alt=\"\" class=\"wp-image-311 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/Designing-Social-Engineering-Security-Policies-2.jpg 1000w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/Designing-Social-Engineering-Security-Policies-2-300x173.jpg 300w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/Designing-Social-Engineering-Security-Policies-2-768x442.jpg 768w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/Designing-Social-Engineering-Security-Policies-2-706x406.jpg 706w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"font-size:13px\">This image made me think about how we&#8217;re all connected through technology, especially through social media and online platforms. It represents how information\u2014and unfortunately misinformation\u2014can spread quickly from one person to another across the globe. From a social science perspective, it shows how human behavior, communication, and social networks play a big role in cybersecurity. People&#8217;s online habits, who they trust, and how they interact with others online can all affect how cyber threats spread and how we respond to them.<\/p>\n<\/div><\/div>\n\n\n\n<p style=\"font-size:12px;font-style:normal;font-weight:400\">Image Source: QCT College, <em>What Is Social Engineering in Cyber Security?<\/em> (April 15, 2024), <em>QCT College<\/em>, <a href=\"https:\/\/qctcollege.com\/what-is-social-engineering-in-cyber-security\/\">https:\/\/qctcollege.com\/what-is-social-engineering-in-cyber-security\/<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/OrgCulture-1-1024x768.jpg\" alt=\"\" class=\"wp-image-312 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/OrgCulture-1-1024x768.jpg 1024w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/OrgCulture-1-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/OrgCulture-1-768x576.jpg 768w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/OrgCulture-1-1536x1152.jpg 1536w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/OrgCulture-1-2048x1536.jpg 2048w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/OrgCulture-1-541x406.jpg 541w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"font-size:13px\">This image made me think about how solving cybersecurity challenges takes teamwork and connection. The puzzle pieces represent how different people and roles fit together\u2014whether it&#8217;s IT professionals, social scientists, policy makers, or everyday users. The stick figures reaching out show the importance of including everyone, even those who may feel left out or disconnected from technology. From a social science perspective, it highlights the value of social inclusion, communication, and building trust in digital spaces to create a safer environment for everyone.<\/p>\n<\/div><\/div>\n\n\n\n<p style=\"font-size:12px\">Image Source: Holt, Troy, <em>How the Science Behind Human Connectedness Impacts Organizational Culture<\/em> (n.d.), <em>PA Times<\/em>, <a href=\"https:\/\/patimes.org\/connected\/\">https:\/\/patimes.org\/connected\/<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/1_debVlQTWiBuTjRMBiO7ZLA-1-1024x682.jpg\" alt=\"\" class=\"wp-image-313 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/1_debVlQTWiBuTjRMBiO7ZLA-1-1024x682.jpg 1024w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/1_debVlQTWiBuTjRMBiO7ZLA-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/1_debVlQTWiBuTjRMBiO7ZLA-1-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/1_debVlQTWiBuTjRMBiO7ZLA-1-609x406.jpg 609w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/1_debVlQTWiBuTjRMBiO7ZLA-1.jpg 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"font-size:13px\">Seeing children typing on keyboards reminded me that they are the future of our digital world. As they grow up surrounded by technology, it&#8217;s important that we teach them not just how to use it, but how to use it <em>safely and responsibly<\/em>. This ties into cybersecurity because kids are often targeted by online threats or exposed to misinformation without realizing it. From a social science perspective, it emphasizes the need for digital literacy, education, and ethical guidance starting at a young age. How we shape their understanding today can impact the safety and health of the internet tomorrow.<\/p>\n<\/div><\/div>\n\n\n\n<p style=\"font-size:12px\">Image Source: Russell, Thomas Holt III, <em>We Are Teaching Cybersecurity the Wrong Way<\/em> (Dec. 8, 2024), <em>Medium<\/em>, <a href=\"https:\/\/thruss09.medium.com\/we-are-teaching-cybersecurity-the-wrong-way-49b748cc2a4a\">https:\/\/thruss09.medium.com\/we-are-teaching-cybersecurity-the-wrong-way-49b748cc2a4a<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"593\" src=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/724114-1-1024x593.jpg\" alt=\"\" class=\"wp-image-314 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/724114-1-1024x593.jpg 1024w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/724114-1-300x174.jpg 300w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/724114-1-768x445.jpg 768w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/724114-1-701x406.jpg 701w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/724114-1.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"font-size:13px\">This photo of a conference or gathering reminds me of how important it is for people to come together to share ideas and stay informed about cybersecurity. Cyber threats are always changing, so professionals\u2014and even everyday users\u2014need spaces where they can learn, discuss, and work together on solutions. From a social science perspective, it shows how human interaction, group behavior, and education all play a role in creating a more secure digital environment. It also highlights how cybersecurity isn\u2019t just a technical field\u2014it depends on people working together, learning from one another, and staying engaged.<\/p>\n<\/div><\/div>\n\n\n\n<p style=\"font-size:12px\">Image Source: <em>CyberTech Accord<\/em>, <em>Joint Civil Society Statement on Cyber Peace and Human Security at the 2021 UN General Assembly First Committee on Disarmament and International Security<\/em> (Oct. 8, 2021), <em>CyberTech Accord<\/em>, <a href=\"https:\/\/cybertechaccord.org\/joint-civil-society-statement-on-cyber-peace-and-human-security-at-the-2021-un-general-assembly-first-committee-on-disarmament-and-international-security\/\">https:\/\/cybertechaccord.org\/joint-civil-society-statement-on-cyber-peace-and-human-security-at-the-2021-un-general-assembly-first-committee-on-disarmament-and-international-security\/<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"300\" src=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/nasa-1lfI7wkGWZ4-unsplash-copyRESIZED-2.jpg\" alt=\"\" class=\"wp-image-315 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/nasa-1lfI7wkGWZ4-unsplash-copyRESIZED-2.jpg 425w, https:\/\/sites.wp.odu.edu\/mdellolio\/wp-content\/uploads\/sites\/38019\/2025\/02\/nasa-1lfI7wkGWZ4-unsplash-copyRESIZED-2-300x212.jpg 300w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"font-size:13px\">This map of the USA at night, with its scattered lights, made me think about how information flows across the country, much like the lights on the map. Some areas are more concentrated with activity, which reflects how certain regions or communities might face higher cyber risks due to factors like digital literacy or access to technology. From a social science perspective, this highlights how cybersecurity is intertwined with social issues like inequality and access to resources. Communities with more concentrated digital activity may require greater focus on education and protection to bridge these gaps and ensure everyone is equally equipped to navigate the digital world safely.<\/p>\n<\/div><\/div>\n\n\n\n<p style=\"font-size:12px\">Image Source: <em>American Society of Civil Engineers (ASCE)<\/em>, <em>Cybersecurity<\/em> (n.d.), <em>American Society of Civil Engineers<\/em>, <a href=\"https:\/\/www.asce.org\/topics\/cybersecurity\">https:\/\/www.asce.org\/topics\/cybersecurity<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYBERSECURITY &amp; SOCIAL SCIENCE Cybersecurity, often viewed as a technical field, is deeply multidisciplinary and benefits significantly from a social science perspective. This course explores cybersecurity&#8217;s social, political, legal, criminological, and economic dimensions, emphasizing a human-factors approach to understanding threats. It examines the societal drivers of cyber incidents and the regulatory frameworks addressing risky behaviors. &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/mdellolio\/cyse201\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE201<\/span><\/a><\/p>\n","protected":false},"author":30286,"featured_media":188,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/pages\/191"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/users\/30286"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/pages\/191\/revisions"}],"predecessor-version":[{"id":343,"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/pages\/191\/revisions\/343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/media\/188"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mdellolio\/wp-json\/wp\/v2\/media?parent=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}